CN102594692A - Traffic shaping method and device - Google Patents

Traffic shaping method and device Download PDF

Info

Publication number
CN102594692A
CN102594692A CN2012100423543A CN201210042354A CN102594692A CN 102594692 A CN102594692 A CN 102594692A CN 2012100423543 A CN2012100423543 A CN 2012100423543A CN 201210042354 A CN201210042354 A CN 201210042354A CN 102594692 A CN102594692 A CN 102594692A
Authority
CN
China
Prior art keywords
mandate
token
bucket
thresholding
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100423543A
Other languages
Chinese (zh)
Other versions
CN102594692B (en
Inventor
马春辉
肖洁
杨洁伟
刘衡祁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201210042354.3A priority Critical patent/CN102594692B/en
Publication of CN102594692A publication Critical patent/CN102594692A/en
Application granted granted Critical
Publication of CN102594692B publication Critical patent/CN102594692B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a traffic shaping method and device, applied to a traffic shaping system comprising a scheduling module, a shaping module and a forwarding module. The shaping module comprises an authorization shaper, an authorization bucket and a leaky bucket shaper; the authorization shaper is used for storing an authorization in the authorization bucket after receiving the authorization issued by the scheduling module, subtracting a token, and judging whether the number of the tokens is less than a first token threshold, if yes, sending a request of stopping issuing the authorization to the scheduling module, otherwise, continuing to receive the authorization; the tokens are injected to the authorization shaper at a first fixed speed; the tokens are injected to the leaky bucket shaper at a second fixed speed, one token is subtracted from the leaky bucket shaper each time when one token is injected, and judging whether authorization exists in the authorization bucket, if yes, taking one authorization out of the authorization bucket and forwarding to the forwarding module. According to the traffic shaping method and device, all authorizations are cached in the authorization bucket and uniformly forwarded to the forwarding module through the leaky bucket shaper; therefore, outburst at downstream is reduced, and the traffic output is smoothened.

Description

A kind of method of traffic shaping and device
Technical field
The present invention relates to data communication field, relate in particular to a kind of method and device of traffic shaping.
Background technology
Along with networks development, the transmission means of sharing medium becomes the main flow of network.The grade of service of a connection can define from the validity that connects, the time delay of connection, these three aspects of bandwidth of connection; Wherein, Flow management system is being played the part of important role aspect the time delay of control connection and the bandwidth, thereby has influenced the service quality (QoS) of a connection.
Traffic shaping (Traffic Shaping) is a kind of measure of initiatively adjusting the flow output speed, and typical effect is that message is transmitted on the speed of a negotiation to observe the agreement with upstream device.Traffic shaping uses token bucket usually, and token is injected into constant speed in the middle of the bucket, and the message fragment of each forwarding all can consume a token.Wherein, token bucket has certain capacity, and after token bucket is full, the new token that injects will be dropped.On the one hand, be a constant owing to inject the speed of token in the token bucket, therefore, on long terms, the average forwarding rate of message is constrained to constant.On the other hand; Because token bucket can accumulate a certain amount of token, therefore, from instantaneous; In forwarding queue, there is the message of n byte to transmit; And accumulated n token (suppose a token represent the message that can transmit 1 byte) this moment in the token bucket, and then message can disposablely consume n token (n>1), and formation is to the burst in downstream.
As shown in Figure 1; A traffic shaping system mainly comprises: scheduler module, and Shaping Module and forwarding module, Shaping Module adopt Token Bucket Policing usually; In token bucket, add token with fixed rate; Whenever receive a mandate, from token bucket, deduct a token, the mandate that will receive then is transmitted to forwarding module.Wherein, after forwarding module receives packet, data pack buffer in formation, is forwarded packet after obtaining the authorization; When the data volume in the formation surpassed the first forwarding thresholding, forwarding module sent the application authorization requests to scheduler module; When the data volume in the formation was lower than the second forwarding thresholding, forwarding module sent to scheduler module and stops paying out authorization requests, and first transmits thresholding transmits thresholding greater than second; If scheduler module receives application authorization requests that forwarding module sends and the token quantity in the token bucket greater than the token bucket thresholding, then scheduler module begins to issue mandate with fixed rate; If scheduler module receives the authorization requests of stopping paying out of stopping paying out authorization requests or Shaping Module transmission that forwarding module sends, then scheduler module stops to send mandate; When the token number in the token bucket was less than or equal to the token bucket thresholding, Shaping Module sent to scheduler module and stops paying out authorization requests.
Actual conditions are; The inner schedule level one device incessantly of scheduler module; Therefore, the path that the request that forwarding module or Shaping Module send to scheduler module need be passed through certain-length usually could arrive and be responsible for producing/scheduler that stops to authorize, thereby causes the path delay of scheduler module inside.On the other hand, there is operating lag scheduler in itself, when the cascade number of plies of scheduler increases, can increase the weight of the operating lag of whole scheduler module.Therefore; Because path delay and/or operating lag that scheduler module is inner; Having some mandates sends to scheduler module at forwarding module or Shaping Module and is still issued after stopping paying out authorization requests; The mandate of these bursts is buffered in the forwarding module, after having packet to get into forwarding module again, can preferentially use the mandate of these buffer memorys to transmit, and causes mailing to the burst of the instantaneous delivery in downstream; This burst is the error range of the bandwidth control of excess flow shaping sometimes, has therefore influenced the precision of traffic shaping.
In order to reduce the burst to downstream, the output of further level and smooth flow improves the precision of traffic shaping, need improve existing traffic shaping system.
Summary of the invention
Technical problem to be solved by this invention provides a kind of method and device of traffic shaping, can reduce the burst to downstream, the output of level and smooth flow, the precision of raising traffic shaping.
In order to solve the problems of the technologies described above; The invention provides a kind of method of traffic shaping, be applied in the traffic shaping system, said system comprises scheduler module, Shaping Module and forwarding module; Said Shaping Module comprises authorizes reshaper, authorizes bucket and leaks the bucket reshaper, and this method comprises:
After authorizing reshaper to receive the mandate that scheduler module issues, said mandate being kept at authorizing in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, is then to send to said scheduler module to stop paying out authorization requests; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Leak in the bucket reshaper and inject token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
Further, said second fixed rate that leaks bucket reshaper injection token, first fixed rate that injects token with said mandate reshaper equates; After the token quantity in the said mandate reshaper reaches token maximum thresholding, the token that newly injects said mandate reshaper is abandoned.
Further, be provided with when authorizing ladle capacity, make the capacity of authorizing bucket authorize bucket to overflow thresholding more than or equal to one, it is a mandate that said mandate bucket overflows thresholding, and wherein, a is an integer; Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
Further, after said forwarding module receives packet, data pack buffer in formation, is forwarded packet after obtaining the authorization; When the data volume of said forwarding module in formation surpasses the first forwarding thresholding, send the application authorization requests to said scheduler module; When the data volume of said forwarding module in formation is lower than the second forwarding thresholding, stop paying out authorization requests to said scheduler module transmission; Wherein, said first transmits thresholding transmits thresholding greater than said second, and the two is integer, and is unit with the byte.
Further, if said scheduler module receives the authorization requests of stopping paying out of stopping paying out authorization requests or the transmission of said Shaping Module that said forwarding module sends, then stop to send and authorize; If said scheduler module receives application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that said forwarding module sends, then begin to issue mandate with fixed rate; Wherein, the satisfied condition of authorizing that receives of said Shaping Module comprises: the token quantity in the said mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
In order to solve the problems of the technologies described above, the invention provides a kind of device of traffic shaping, be applied in the traffic shaping system, said system comprises scheduler module, traffic shaping device and forwarding module, said traffic shaping device comprises:
Authorize reshaper, be used to receive the mandate that scheduler module issues after, said mandate is kept at authorizes in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, be then to send to stop paying out authorization requests to said scheduler module; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Authorize bucket, be used for receiving the mandate of said mandate reshaper forwarding and be stored in said mandate bucket;
Leak the bucket reshaper, be used for injecting token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
Further, said second fixed rate that leaks bucket reshaper injection token, first fixed rate that injects token with said mandate reshaper equates; Said mandate reshaper also is used for after the token quantity of said mandate reshaper reaches token maximum thresholding, the token that newly injects said mandate reshaper being abandoned.
Further, said mandate bucket is used to be provided with when authorizing ladle capacity, makes the capacity of authorizing bucket authorize bucket to overflow thresholding more than or equal to one, and it is a mandate that said mandate bucket overflows thresholding, and wherein, a is an integer; Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
Further, said forwarding module after being used to receive packet, in formation, forwards data pack buffer after obtaining the authorization with packet; Also be used for when the data volume of said formation surpasses the first forwarding thresholding, sending the application authorization requests to said scheduler module; Also be used for when the data volume of said formation is lower than the second forwarding thresholding, send to said scheduler module and stop paying out authorization requests; Wherein, said first transmits thresholding transmits thresholding greater than said second, and the two is integer, and is unit with the byte.
Further, said scheduler module if be used for receiving the authorization requests of stopping paying out of stopping paying out authorization requests or the transmission of said Shaping Module that said forwarding module sends, then stop to send and authorizes; If also be used for receiving application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that said forwarding module sends, then begin to issue mandate with fixed rate; Wherein, the satisfied condition of authorizing that receives of said Shaping Module comprises: the token quantity in the said mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
Compared with prior art; The method of traffic shaping provided by the invention and device are improved to a traffic shaping device that comprises the mandate reshaper, authorizes bucket and leakage bucket reshaper three parts with traditional token bucket, and this traffic shaping device passes through to authorize all mandates from the upper reaches of bucket buffer memory; Evenly be handed down to forwarding queue through leaking the bucket reshaper then; Thereby reduced the burst to downstream, the level and smooth output of flow has improved the precision of traffic shaping.
Description of drawings
Fig. 1 is the structural representation of traffic shaping system in the prior art.
Fig. 2 is the process chart of authorizing reshaper in the flow shaping method of the embodiment of the invention.
Fig. 3 is the handling process after the leakage bucket reshaper of the embodiment of the invention injects token at every turn.
Fig. 4 is the structural representation of a kind of traffic shaping device of the embodiment of the invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment among the application and the characteristic among the embodiment be combination in any each other.
The embodiment of the invention provides a kind of method of traffic shaping, is applied in the traffic shaping system, and said system comprises scheduler module, Shaping Module and forwarding module, and said Shaping Module comprises authorizes reshaper, authorizes bucket and leak the bucket reshaper, and this method comprises:
After authorizing reshaper to receive the mandate that scheduler module issues, said mandate being kept at authorizing in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, is then to send to said scheduler module to stop paying out authorization requests; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Leak in the bucket reshaper and inject token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
In traffic shaping system as shown in Figure 1, after forwarding module receives packet, data pack buffer in formation, is forwarded packet after obtaining the authorization.Judge data volume in the formation when forwarding module and surpass first when transmitting thresholding, send the application authorization requests, judge data volume in the formation when forwarding module and be lower than second when transmitting thresholding, send to scheduler module and stop paying out authorization requests to scheduler module.Wherein, first transmits thresholding transmits thresholding greater than second, and the two is integer, and is unit with the byte.
For scheduler module,, then stop to send and authorize if scheduler module receives the authorization requests of stopping paying out of stopping paying out authorization requests or Shaping Module transmission that forwarding module sends; If scheduler module receives application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that forwarding module sends, then begin to issue mandate with fixed rate; Wherein, the satisfied condition of authorizing that receives of Shaping Module comprises: the token quantity in the mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
As shown in Figure 2, when forwarding module sends the application authorization requests to scheduler module, scheduler module authorizes the handling process of reshaper to comprise after beginning to issue mandate with fixed rate:
Step 101, the mandate of authorizing reshaper receiving scheduling module to issue;
Step 102, receive a mandate after, said mandate is kept at authorizes in the bucket, deduct a token;
Whether step 103 judges token quantity less than the first token thresholding, is execution in step 104 then, otherwise forwards step 101 to;
Step 104 is stopped paying out authorization requests to the scheduler module transmission;
As shown in Figure 3, the handling process that leakage bucket reshaper injects behind the token at every turn comprises:
Step 201 is injected a token;
Step 202 spills a token;
Step 203 judge to authorize in the bucket whether mandate is arranged, and is execution in step 204 then, otherwise forwards step 201 to;
Step 204 is taken a mandate away and is transmitted to forwarding module from authorize bucket.
When the flow orthopedic systems is carried out initialization, comprise following three aspects:
1) according to shaping parameter first fixed rate of authorizing reshaper to inject token is set, the method for token charge velocity that token bucket is set in concrete method to set up and the background technology is identical.
2) will leak second fixed rate that the bucket reshaper injects token, be set at first fixed rate that equals to authorize reshaper injection token, thereby guarantee to satisfy the requirement of shaping parameter through the shaping bandwidth of leaking the acquisition of bucket reshaper.
3) be provided with when authorizing ladle capacity, in order to prevent to produce the situation about abandoning of authorizing, need to authorize bucket capacity setting must barrel to overflow thresholding big than authorizing.Wherein, it is a mandate that said mandate bucket overflows thresholding, and a is an integer; Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
In the above-described embodiment, all mandates that scheduler module issues all at first are kept at authorizes in the bucket, and can directly not be handed down to forwarding module, wherein, authorizes through a leakage bucket reshaper and evenly is handed down to forwarding queue, and therefore, bursts of traffic is suppressed.Especially; Because causing some mandates to be sent to scheduler module at forwarding module or Shaping Module, path delay that scheduler module is inner and/or operating lag still issued following time after stopping paying out authorization requests; The mandate of these bursts can be buffered in authorizes in the bucket; Evenly issue through leaking the bucket reshaper then, reduced burst downstream.
As shown in Figure 4, the embodiment of the invention provides a kind of device of traffic shaping, is applied in the traffic shaping system, and said system comprises scheduler module, traffic shaping device and forwarding module, and said traffic shaping device comprises:
Authorize reshaper, be used to receive the mandate that scheduler module issues after, said mandate is kept at authorizes in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, be then to send to stop paying out authorization requests to said scheduler module; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Authorize bucket, be used for receiving the mandate of said mandate reshaper forwarding and be stored in said mandate bucket;
Leak the bucket reshaper, be used for injecting token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
Wherein, said second fixed rate that leaks bucket reshaper injection token, first fixed rate that injects token with said mandate reshaper equates; Said mandate reshaper also is used for after the token quantity of said mandate reshaper reaches token maximum thresholding, the token that newly injects said mandate reshaper being abandoned.
Wherein, said mandate bucket is used to be provided with when authorizing ladle capacity, makes the capacity of authorizing bucket authorize bucket to overflow thresholding more than or equal to one, and it is a mandate that said mandate bucket overflows thresholding, and wherein, a is an integer;
Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
Wherein, said forwarding module after being used to receive packet, in formation, forwards data pack buffer after obtaining the authorization with packet; Also be used for when the data volume of said formation surpasses the first forwarding thresholding, sending the application authorization requests to said scheduler module; Also be used for when the data volume of said formation is lower than the second forwarding thresholding, send to said scheduler module and stop paying out authorization requests; Wherein, said first transmits thresholding transmits thresholding greater than said second, and the two is integer, and is unit with the byte.
Wherein, said scheduler module if be used for receiving the authorization requests of stopping paying out of stopping paying out authorization requests or the transmission of said Shaping Module that said forwarding module sends, then stop to send and authorizes; If also be used for receiving application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that said forwarding module sends, then begin to issue mandate with fixed rate; Wherein, the satisfied condition of authorizing that receives of said Shaping Module comprises: the token quantity in the said mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
The method of a kind of traffic shaping that above-mentioned execution mode provides and device; Traditional token bucket is improved to a traffic shaping device that comprises the mandate reshaper, authorizes bucket and leakage bucket reshaper three parts; This traffic shaping device evenly is handed down to forwarding queue through leaking the bucket reshaper then, thereby has reduced the burst to downstream through authorizing all mandates from the upper reaches of bucket buffer memory; The level and smooth output of flow has improved the precision of traffic shaping.Especially, above-mentioned execution mode of the present invention has reduced because the burst to downstream that the path delay of scheduler module inside and/or operating lag cause.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said program can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize, correspondingly, each the module/unit in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Need to prove; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (10)

1. the method for a traffic shaping is applied in the traffic shaping system, and said system comprises scheduler module, Shaping Module and forwarding module, and said Shaping Module comprises authorizes reshaper, authorizes bucket and leak the bucket reshaper, and this method comprises:
After authorizing reshaper to receive the mandate that scheduler module issues, said mandate being kept at authorizing in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, is then to send to said scheduler module to stop paying out authorization requests; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Leak in the bucket reshaper and inject token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
2. the method for claim 1 is characterized in that:
Said second fixed rate that leaks bucket reshaper injection token, first fixed rate that injects token with said mandate reshaper equates;
After the token quantity in the said mandate reshaper reaches token maximum thresholding, the token that newly injects said mandate reshaper is abandoned.
3. according to claim 1 or claim 2 method is characterized in that:
Be provided with when authorizing ladle capacity, make the capacity of authorizing bucket authorize bucket to overflow thresholding more than or equal to one, it is a mandate that said mandate bucket overflows thresholding, and a is an integer;
Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
4. according to claim 1 or claim 2 method is characterized in that:
After said forwarding module receives packet, data pack buffer in formation, is forwarded packet after obtaining the authorization;
When the data volume of said forwarding module in formation surpasses the first forwarding thresholding, send the application authorization requests to said scheduler module;
When the data volume of said forwarding module in formation is lower than the second forwarding thresholding, stop paying out authorization requests to said scheduler module transmission;
Wherein, said first transmits thresholding transmits thresholding greater than said second, and the two is integer, and is unit with the byte.
5. method as claimed in claim 4 is characterized in that:
If said scheduler module receives the authorization requests of stopping paying out of stopping paying out authorization requests or the transmission of said Shaping Module that said forwarding module sends, then stop to send and authorize;
If said scheduler module receives application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that said forwarding module sends, then begin to issue mandate with fixed rate;
Wherein, the satisfied condition of authorizing that receives of said Shaping Module comprises: the token quantity in the said mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
6. the device of a traffic shaping is applied in the traffic shaping system, and said system comprises scheduler module, traffic shaping device and forwarding module, and said traffic shaping device comprises:
Authorize reshaper, be used to receive the mandate that scheduler module issues after, said mandate is kept at authorizes in the bucket, deduct a token, whether judge token quantity then less than the first token thresholding, be then to send to stop paying out authorization requests to said scheduler module; Otherwise continue to receive the mandate that said scheduler module issues; Wherein, said mandate reshaper injects token with first fixed rate;
Authorize bucket, be used for receiving the mandate of said mandate reshaper forwarding and be stored in said mandate bucket;
Leak the bucket reshaper, be used for injecting token with second fixed rate, token of every injection deducts a token, and judges in the said mandate bucket whether mandate is arranged from said leakage bucket reshaper, is then from said mandate bucket, to take a mandate away to be transmitted to forwarding module.
7. device as claimed in claim 6 is characterized in that:
Said second fixed rate that leaks bucket reshaper injection token, first fixed rate that injects token with said mandate reshaper equates;
Said mandate reshaper also is used for after the token quantity of said mandate reshaper reaches token maximum thresholding, the token that newly injects said mandate reshaper being abandoned.
8. like claim 6 or 7 described devices, it is characterized in that:
Said mandate bucket is used to be provided with when authorizing ladle capacity, makes the capacity of authorizing bucket authorize bucket to overflow thresholding more than or equal to one, and it is a mandate that said mandate bucket overflows thresholding, and a is an integer;
Wherein, influence authorizes factor that bucket overflows the thresholding size to comprise following one or more: scheduler module issues the inner path delay and the inner operating lag of scheduler module of speed, scheduler module of mandate; Concrete influence relation comprises: it is fast more that scheduler module issues the speed of mandate, and it is big more that said mandate bucket overflows thresholding; The path delay of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding; The operating lag of scheduler module inside is big more, and it is big more that said mandate bucket overflows thresholding.
9. like claim 6 or 7 described devices, it is characterized in that:
Said forwarding module after being used to receive packet, in formation, forwards data pack buffer after obtaining the authorization with packet; Also be used for when the data volume of said formation surpasses the first forwarding thresholding, sending the application authorization requests to said scheduler module; Also be used for when the data volume of said formation is lower than the second forwarding thresholding, send to said scheduler module and stop paying out authorization requests; Wherein, said first transmits thresholding transmits thresholding greater than said second, and the two is integer, and is unit with the byte.
10. device as claimed in claim 9 is characterized in that:
Said scheduler module if be used for receiving the authorization requests of stopping paying out of stopping paying out authorization requests or the transmission of said Shaping Module that said forwarding module sends, then stop to send and authorizes; If also be used for receiving application authorization requests and the satisfied condition of authorizing that receives of Shaping Module that said forwarding module sends, then begin to issue mandate with fixed rate;
Wherein, the satisfied condition of authorizing that receives of said Shaping Module comprises: the token quantity in the said mandate reshaper is greater than the second token thresholding; The said first token thresholding is less than or equal to the said second token thresholding.
CN201210042354.3A 2012-02-23 2012-02-23 A kind of method and device of traffic shaping Active CN102594692B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210042354.3A CN102594692B (en) 2012-02-23 2012-02-23 A kind of method and device of traffic shaping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210042354.3A CN102594692B (en) 2012-02-23 2012-02-23 A kind of method and device of traffic shaping

Publications (2)

Publication Number Publication Date
CN102594692A true CN102594692A (en) 2012-07-18
CN102594692B CN102594692B (en) 2018-01-19

Family

ID=46482908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210042354.3A Active CN102594692B (en) 2012-02-23 2012-02-23 A kind of method and device of traffic shaping

Country Status (1)

Country Link
CN (1) CN102594692B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888372A (en) * 2012-12-21 2014-06-25 中兴通讯股份有限公司 Traffic shaping method and data processing equipment
CN104243333A (en) * 2013-06-24 2014-12-24 阿里巴巴集团控股有限公司 Traffic control method for address resolution protocol messages
CN104811402A (en) * 2015-03-24 2015-07-29 华为技术有限公司 Authorization value processing method and device and network system
CN113067778A (en) * 2021-06-04 2021-07-02 新华三半导体技术有限公司 Flow management method and flow management chip
CN113645148A (en) * 2021-07-01 2021-11-12 苏州裕太微电子有限公司 Traffic shaper token updating system and method for time-sensitive network
CN117041162A (en) * 2023-10-09 2023-11-10 芯耀辉科技有限公司 Traffic shaping method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217495A (en) * 2008-01-11 2008-07-09 北京邮电大学 Traffic monitoring method and device applied under T-MPLS network environment
CN101621460A (en) * 2008-06-30 2010-01-06 中兴通讯股份有限公司 Packet scheduling method and device
CN102164092A (en) * 2011-05-23 2011-08-24 北京交通大学 Method and system for guaranteeing service quality of integrated identification network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217495A (en) * 2008-01-11 2008-07-09 北京邮电大学 Traffic monitoring method and device applied under T-MPLS network environment
CN101621460A (en) * 2008-06-30 2010-01-06 中兴通讯股份有限公司 Packet scheduling method and device
CN102164092A (en) * 2011-05-23 2011-08-24 北京交通大学 Method and system for guaranteeing service quality of integrated identification network

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888372A (en) * 2012-12-21 2014-06-25 中兴通讯股份有限公司 Traffic shaping method and data processing equipment
CN103888372B (en) * 2012-12-21 2017-05-17 中兴通讯股份有限公司 Traffic shaping method and data processing equipment
CN104243333A (en) * 2013-06-24 2014-12-24 阿里巴巴集团控股有限公司 Traffic control method for address resolution protocol messages
CN104243333B (en) * 2013-06-24 2018-04-10 阿里巴巴集团控股有限公司 A kind of flow control methods of address analysis protocol message
CN104811402A (en) * 2015-03-24 2015-07-29 华为技术有限公司 Authorization value processing method and device and network system
CN104811402B (en) * 2015-03-24 2018-07-20 华为技术有限公司 Authorize Numerical Methods, device and network system
CN113067778A (en) * 2021-06-04 2021-07-02 新华三半导体技术有限公司 Flow management method and flow management chip
CN113645148A (en) * 2021-07-01 2021-11-12 苏州裕太微电子有限公司 Traffic shaper token updating system and method for time-sensitive network
CN113645148B (en) * 2021-07-01 2024-04-05 裕太微电子股份有限公司 Traffic shaper token updating system and method for time-sensitive network
CN117041162A (en) * 2023-10-09 2023-11-10 芯耀辉科技有限公司 Traffic shaping method and device
CN117041162B (en) * 2023-10-09 2024-02-09 芯耀辉科技有限公司 Traffic shaping method and device

Also Published As

Publication number Publication date
CN102594692B (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN102594692A (en) Traffic shaping method and device
TWI694696B (en) Network-based download/streaming concept
CA2903858C (en) Adaptive resource management for multi-screen video applications over cable wi-fi networks
US8537659B2 (en) Method and system for reducing service interruptions to mobile communication devices
AU2009203966B2 (en) System and method to adapt to network congestion
WO2016141820A1 (en) Cdn network system and speed limit control method thereof, and cdn node and server
CN101345679B (en) QoS guarantee method and system of dynamic business, AAA and Anchor SFA
CN103647722A (en) Reputation-based link congestion control method
EP2481251A1 (en) Rate shaping for wireless communication using token bucket that allows token debt
CN102572768B (en) Charging method, authentication method, counting equipment and authenticating device
CN107222358A (en) Wrap flux monitoring method per second and device
CN103885840B (en) FCoE protocol acceleration engine IP core based on AXI4 bus
CN108111531B (en) Method and device for enhancing video live broadcast quality
CN109392024A (en) A kind of control method and relevant device of quality of service stream
EP2936826A1 (en) Method and apparatus for content delivery over a broadcast network
KR100987258B1 (en) Apparatus and method for controling data flow in a communication system
CN106162903A (en) A kind of on-demand method and apparatus calling QoS ability
CN108011845A (en) A kind of method and apparatus for reducing time delay
KR102121782B1 (en) Method and system for providing deterministic quality of service for communication devices
CN102340758B (en) Charging method, device and system, and authentication device
US20040218565A1 (en) Method of operating a base station
US7855954B2 (en) Speculative credit data flow control
US6868063B1 (en) Shaping method and related shaper
CN112637898A (en) Downlink data stream session bandwidth limiting method, network element, device and medium
WO2016090607A1 (en) Backhaul terminal, base station and flow control method for wireless network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant